CSE4003 Cyber-Security ETH 1 AC41

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Cybersecurity L, T, P ,J, C

Subject Code:
3, 0, 0, 4 , 4
Objectives • To learn the concepts of number theory, cryptographic techniques.
• To understand integrity and authentication process
• To familiarize various cyber threats, attacks, vulnerabilities and
defensive mechanisms
• To know about security policies and practices.

Expected Course After successfully completing the course the student should be able to
Outcome
1. know the fundamental mathematical concepts related to security
2. understand and implement the cryptographic techniques and know the
real time applications of various cryptographic techniques
3. comprehend the authenticated process and integrity, and its
implementation
4. know fundamentals of cybercrimes and the cyber offenses
5. understand the cyber threats, attacks and vulnerabilities and its
defensive mechanism
6. design suitable security policies

Student Learning 1, 2, 5, 9, 17
Outcomes (SLO)
Module Topics L Hrs SLO
1 Finite Fields and Number Theory: Modular arithmetic – Euclidian
Algorithm – Primality Testing – Fermat’s and Euler’s theorem –Chinese 6 1
Reminder theorem – Discrete Logarithms
2 Cryptographic Techniques:
Symmetric key cryptographic techniques: Introduction to Stream cipher
– Block cipher: DES – AES- IDEA
Asymmetric key cryptographic techniques: principles – RSA – 9 1,5

ElGamal - Elliptic Curve cryptography – Key distribution and Key


exchange protocols

3 Integrity and Authentication


Hash functions – Secure Hash Algorithm (SHA)
Message Authentication – Message Authentication Code (MAC) – 5 1,5

Digital Signature Algorithm : RSA & ElGamal based


4 Cybercrimes and cyber offenses
Classification of cybercrimes – planning of attacks – social engineering:
7 9
Human based – Computer based – Cyberstalking – Cybercafe and
Cybercrimes
5 Cyber Threats, Attacks and Prevention:
Phishing – Password cracking – Keyloggers and Spywares – DoS and
DDoS attacks – SQL Injection 9 9

Identity Theft (ID) : Types of identity theft – Techniques of ID theft

6 Cybersecurity Policies and Practices


What security policies are – determining the policy needs – writing
security policies – Internet and email security policies – Compliance 7 5
and Enforcement of policies- Review

7 Recent Trends 2 2
Project # Generally a team project [5 to 10 members] 60 [Non 17
# Concepts studied in Cybersecurity course should have been used Contact
# Down to earth application and innovative idea should have been attempted hrs]
# Report in Digital format with all drawings using software package to be submitted.
# Assessment on a continuous basis with a min of 3 reviews.

Projects may be given as group projects

The following is the sample project that can be given to students to be implemented
using appropriate tools like Cain and Abel, PhishHook, Zombie Zapper etc.

 Secured chat application


 Password cracking
 Key loggers
 E-Mail Spoofing
 Internet Time Stealing
 Email security application
 Secured credit card transaction
 Design certification of authority
 Intrusion detection and prevention
 Implementation of authentication protocol
 Digital watermarking
 Phishing attacks
 Signcryption
 Visual Cryptography
 Digital Envelope
Text Books
1. Cryptography and Network security, William Stallings, Pearson Education, 7th Edition, 2016
2. Cyber Security, Understanding cyber crimes, computer forensics and legal perspectives, Nina Godbole,
Sunit Belapure, Wiley Publications, Reprint 2016
3. Writing Information Security Policies, Scott Barman, New Riders Publications, 2002
Reference Books

1. Cybersecurity for Dummies, Brian Underdahl, Wiley, 2011


2. Cryptography and Network security, Behrouz A. Forouzan , Debdeep Mukhopadhyay, Mcgraw Hill
Education, 2nd Edition, 2011

Cybersecurity
Knowledge Areas that contain topics and learning outcomes covered in the course

Knowledge Area Total Hours of Coverage

CE:SPR (Social and Professional 45


Issues)/CE:NWK5 (Computer
Network)/CS:SP (Social Issues and
Professional Practice)/CS:IAS (Information
Assurance and Security)

Body of Knowledge coverage


[List the Knowledge Units covered in whole or in part in the course. If in part, please indicate
which topics and/or learning outcomes are covered. For those not covered, you might want to
indicate whether they are covered in another course or not covered in your curriculum at all.
This section will likely be the most time-consuming to complete, but is the most valuable for
educators planning to adopt the CS2013 guidelines.]

KA Knowledge Unit Topics Covered Hours

CE:SPR/CS:SP/CS:IAS CE:SPR1 Public Growth of, control of, and access to the 25
Policy / CE:SPR2 Internet – cybersecurity policies / cyber
Methods and Tools threats, attacks and defensive
of analysis / mechanism/ History and example of
CE:SPR7 cybercrime – Cracking – Prevention
Computer Crime/ Strategies
SP/Analytical
Tools/ SP/Security
Policies,
Laws and
Computer
Crimes/IAS:
Security Policy
and Governance

CS:IAS/CE:NWK5 Cryptography/ Finite fields – Number theory – 20


Data security and cryptographic techniques /
Integrity Authentication Protocols –Encryption
and Privacy

Total hours 45
Where does the course fit in the curriculum?
[In what year do students commonly take the course? Is it compulsory? Does it have pre-
requisites, required following courses? How many students take it?]

This course is a
 Elective Course.
 Suitable from 6th semester onwards.
 Knowledge of any one programming language and network and communication
are preferred.

What is covered in the course?


[A short description, and/or a concise list of topics - possibly from your course syllabus.(This is
likely to be your longest answer)]

Module 1: Finite fiends and Number theory


Basic mathematical foundations needed for cryptographic and security are covered.

Module II: Cryptographic techniques


This part covers the symmetric and asymmetric key cryptographic techniques required for
information assurance and security.
Module III: Integrity and Authentication
This section discusses various techniques needed for message integrity and user authentication
for information assurance and security.

Module 1V: Cybercrimes and cyber offenses


Different classification of cybercrimes and cyber offenses are described in this part IV.

Module V: Cybersecurity threats, attacks and Prevention


This part covers various threats, important attacks and the protection mechanism for the same.
Module VI: Cybersecurity policies and practices
This section discusses how to write security policies, how to compliance and enforce the policies
and finally review the same.

What is the format of the course?


[Is it face to face, online or blended? How many contact hours? Does it have lectures, lab
sessions, discussion classes?]

This Course is designed with 100 minutes of in-classroom sessions per week, 30 minutes of
video/reading instructional material per week, as well as 200 minutes of non-contact time spent
on implementing course related project per week. Generally this course should have the
combination of lectures, in-class discussion, case studies, guest-lectures, mandatory off-class
reading material, quizzes.

How are students assessed?


[What type, and number, of assignments are students are expected to do? (papers, problem sets,
programming projects, etc.). How long do you expect students to spend on completing assessed
work?]

 Students are assessed on a combination group activities, classroom discussion, projects,


and continuous, final assessment tests.

 Students can earn additional weightage based on certificate of completion of a related


MOOC course.
Session wise plan
Student Outcomes Covered: 1, 2, 5, 9 , 17

Class Lab Topic Covered levels of Reference Remarks


Hour Hour mastery Book

1 Modular arithmetic Familiarity, T.1


usage
1 Euclidian Algorithm Familiarity, T.1
usage
1 Primality Testing Familiarity, T.1
usage
1 Fermat’s and Euler’s theorem Familiarity, T.1
usage
1 Chinese Reminder theorem Familiarity, T.1
usage
1 Discrete Logarithms Familiarity, T.1
usage
1 Symmetric key cryptographic Familiarity, T.1
techniques: Introduction to Stream usage
cipher – Block cipher
1 3DES Familiarity, T.1 Project
usage, (J)
assessment
1 IDEA Familiarity, T.1 Project
usage, (J)
assessment
1 AES Familiarity, T.1 Project
usage, (J)
assessment
1 Asymmetric key cryptographic Familiarity T.1
techniques: principles
1 RSA Familiarity, T.1 Project
usage, (J)
assessment
1 ElGamal Familiarity, T.1 Project
usage, (J)
assessment
1 Elliptic Curve cryptography Familiarity, T.1 Project
usage, (J)
assessment
1 Key distribution and Key exchange Familiarity, T.1 Project
usage, (J)
protocol assessment
1 Integrity and Authentication Familiarity, T.1
Hash functions Usage
1 – Secure Hash Algorithm (SHA) Familiarity, T.1 Project
Usage, (J)
Assessment
1 Message Authentication Familiarity, T.1
Usage
1 Message Authentication Code (MAC) Familiarity, T.1
Usage
1 Digital Signature Algorithm : RSA Familiarity, T.1 Project
and ElGamal based Usage, (J)
Assessment
2 Cybercrimes and cyber offenses Familiarity, T.2
Classification of cybercrimes usage
1 planning of attacks Familiarity T.2
1 social engineering: Human based Familiarity, T.2
usage
1 Computer based Familiarity, T.2
usage
1 Cyberstalking Familiarity, T.2
usage
1 Cybercafe and Cybercrimes Familiarity T.2
1 Cyber Threats, Attacks and Familiarity T.2
Prevention
1 Phishing Familiarity, T.2 Project
Usage, (J)
Assessment
1 Password cracking Familiarity, T.2 Project
Usage, (J)
Assessment
1 Keyloggers and Spywares Familiarity, T.2 Project
Usage, (J)
Assessment
1 DoS and DDoS attacks Familiarity, T.2 Project
Usage, (J)
Assessment
1 SQL Injection Familiarity, T.2 Project
Usage, (J)
Assessment
1 Identity Theft (ID) : Types of identity Familiarity, T.2
theft usage
2 Techniques of ID theft Familiarity, T.2 Project
usage, (J)
Assessment
1 Cybersecurity Policies and Practices: Familiarity T.3
What security policies are
1 determining the policy needs Familiarity, T.3
usage
1 writing security policies Familiarity, T.3
usage
2 Internet and email security policies Familiarity, T.3
usage
1 Compliance and Enforcement of Familiarity T.3
policies
1 Review Familiarity T.3
Total
Lecture
Hrs:
45

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy